Product activation

from Wikipedia, the free encyclopedia
Product activation as a model

The product activation ( software activation ) is a form of copy protection that the conditions for the use of some software forms. In contrast to product registration, there is generally no transfer of personal data during product activation . Instead, the software is linked to the user's hardware.

Until the product has been successfully activated, the use of appropriately protected software is not possible or only possible to a limited extent (for a limited period of time).

As far as can be understood, product activation was used by Microsoft for the first time for private users to prevent the illegal use of Windows XP and Office . Thus, the term itself and the process flow are heavily influenced by Microsoft.

Procedure

The differences in the technical process of product activation are only very minor in the case of different software manufacturers. When the user installs the software, he must first enter the individual license key (also called CD key or product key) that he received with the purchased software. In the course of the installation routine, a so-called installation ID is then calculated from the license key and hardware features. This has the property that the individual hardware features can practically no longer be traced from it, but the product key can be easily found. The installation ID is then transmitted to the manufacturer via the Internet or telephone, who now has the license key in connection with a hash value , i.e. a number that was calculated from hardware features. The manufacturer can now check in its database how many different computers the software has already been installed on. The manufacturer can now send the user the confirmation ID, which in turn is calculated from the installation ID and is therefore individual for each installation.

Microsoft offers two product activation methods for volume license keys for companies that run without user intervention: the establishment of a Key Management Service ( KMS ) or the use of a Multiple Activation Key ( MAK ). KMS requires a minimum number of 25 clients to be activated, which are regularly connected to the KMS via the network. MAK, on ​​the other hand, is recommended if fewer than 25 computers need to be activated or if they have limited network connections. KMS and MAK are offered for both operating systems and other Microsoft products.

See also: Product Activation of Windows XP

Legal problems in Germany

The use of product activation technologies in the mass market poses several legal problems. These are discussed in specialist journals, but are largely unresolved as there have not been any legal disputes regarding the following conflicts in the past. In particular, the questions arise whether the use of product activation routines

Furthermore, there is often talk of a violation of the right to informational self-determination , which, however, is to be denied in the case of a pure software activation, since here, as already mentioned, no personal data is transmitted. However, some product activation techniques such as Steam require the creation of a personal account. The latter in particular turns out to be an obstacle, since reselling after use is impossible or only possible with great effort in advance of activation.

Examples of software that must be activated

Examples of operating systems :

Examples of application software :

Examples of computer games :

  • Earth 2160 , 2005
  • Games that are based on the Steam platform and can be bought on Steam (including Counter-Strike version 1.6 or higher, Half-Life and other games mainly produced by Valve , but also by other development studios); however, there are a few exceptions

Examples of software that program developers can offer product activation

  • CopyShield
  • Protection! Licensing Toolkit
  • OriginKeyring
  • CrypKey
  • PELock
  • EnigmaProtector
  • FLEXnet Publisher (Flexera Software)
  • SafeNet (Gemalto)
  • SolidLicense
  • ICE License Protection
  • CodeMeter (Wibu-Systems)

With some so-called PE detector programs, laypeople can find out not only general technical information about a program file , but also the activation technologies used by the program.

Regionalized activation

Kaspersky Lab, for example, uses regionalized activation codes for its antivirus programs (this is how a US code does not work in Germany and vice versa), partly to make international trade in pirated copies more difficult, partly because the programs are sold at different prices in different regions. Once activated, the software can be used anywhere. Problems can arise if the license has to be renewed or the software has to be reinstalled in a different region than the one for which the license was purchased. The region is recognized by the IP address, so an Internet connection is required for activation.

A number of computer games also have regionalized activation.

The Galaxy smartphones from Samsung sold in America and Europe must be activated by a local SIM card, but can then also be used in other regions. The regionalized activation is intended to prevent gray imports.

Some credit cards can be blocked for certain regions of the world in order to prevent theft and misuse abroad. If the cardholder wishes to travel abroad and use the card there, the block for the region concerned can be temporarily lifted.

Distinguish themselves from the regionalised activation is the region code , which is to prevent the use of a product in other regions. The best-known examples are region-protected DVDs and Blu-ray discs, which only run in players with a matching region code. In the case of Blu-ray discs, the region code is only requested from the playback program, not from the drive or the operating system, so that by manipulating the playback program on the computer, discs from different regions can be played as often as required. The region code is only part of the firmware for standalone players. Blu-ray discs can also query the country code of the player / playback program, so that e.g. For example, such a protected disc from the USA does not run in Japan or vice versa (the USA and Japan are both in Blu-ray region A, but have different country codes). Although there are only three Blu-ray regions, this allows for more precise distribution control than with DVDs.

But also, for example, printers and their cartridges can have a regional code so that the user has to buy them in his region and cannot switch to imports from cheaper regions. Most of these cartridges also have a "built-in expiration date" (after a certain period of time they no longer work, even if they are still full), so that you can not stock up and can also tell whether you have tried to refill them.

Some video games and game consoles are also region protected.

Internet activation of demo versions

Some programs have to be activated on the Internet during the trial period. The program then connects to the Internet when it starts and checks whether the trial period has expired. Since the information about the trial period is not stored on the user's computer but on an external Internet server, manipulation to reset the trial period is extremely difficult. A disadvantage for the user is that the program cannot be used without an Internet connection, even if it is no longer needed.

See also

literature

  • Christoph Baus: Avoiding the exhaustion effect by withholding usage rights? . In: Multimedia and Law . Vol. 1, 2002, p. 14 ff.
  • Florian Faust : Software protection through product activation . In: Communication & Law . 2002, p. 583 ff.
  • Christian Runte: Product activation - Civil law aspects of the "activation" of software . In: Computer and Law . 2001, p. 657 ff.